US5652793A - Method and apparatus for authenticating the use of software - Google Patents

Method and apparatus for authenticating the use of software Download PDF

Info

Publication number
US5652793A
US5652793A US08/436,143 US43614395A US5652793A US 5652793 A US5652793 A US 5652793A US 43614395 A US43614395 A US 43614395A US 5652793 A US5652793 A US 5652793A
Authority
US
United States
Prior art keywords
value
computer
circuit
application program
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US08/436,143
Inventor
Curtis Priem
David S. H. Rosenthal
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nvidia Corp
Original Assignee
Nvidia Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nvidia Corp filed Critical Nvidia Corp
Priority to US08/436,143 priority Critical patent/US5652793A/en
Assigned to NVIDIA CORPORATION reassignment NVIDIA CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PRIEM, CURTIS, ROSENTHAL, DAVID S.H.
Application granted granted Critical
Publication of US5652793A publication Critical patent/US5652793A/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Definitions

  • This invention relates to computer circuitry and, more particularly, to apparatus and a method for assuring that an application program which is run on a computer is authorized to run on such circuitry.
  • an application program If an application program is to be executed by a computer, it must be read into the computer's memory from whatever medium (e.g., floppy disk or CD-ROM) was used to supply it to the user. If the application is read into memory it can normally be written to some other storage medium. Since application programs are copyable, anyone who has purchased an application program may copy that program for use by someone else. Because of this, the manufacture and sale of software for personal computers are especially subject to fraud.
  • a hardware encoding circuit which generates a code value unique to a particular computer, stores a password unique to an application program and to the particular computer, tests the stored password against a verification value generated by the hardware encoding program each time the application program is run, and generates an error signal if the stored password and the verification value do not match.
  • FIG. 1 is a block diagram of a computer system which may include the present invention.
  • the manipulations performed are often referred to in terms, such as adding or comparing, which are commonly associated with mental operations performed by a human operator. No such capability of a human operator is necessary or desirable in most cases in any of the operations described herein which form part of the present invention; the operations are machine operations.
  • Useful machines for performing the operations of the present invention include general purpose digital computers or other similar devices. In all cases the distinction between the method operations in operating a computer and the method of computation itself should be borne in mind.
  • the present invention relates to a method and apparatus for operating a computer in processing electrical or other (e.g. mechanical, chemical) physical signals to generate other desired physical signals.
  • FIG. 1 there is illustrated a block diagram of a computer system 10 configured to utilize the present invention.
  • the system 10 includes a central processing unit 11 which executes the various instructions provided to control the operations of the system 10.
  • the central processing unit 11 is joined to a bus 12 adapted to carry information between the various components of the system 10.
  • main memory 13 Joined to the bus 12 is main memory 13 which is typically constructed of dynamic random access memory arranged in a manner well known to those skilled in the prior art to store information during a period in which power is provided to the system 10.
  • peripheral components such as long term memory 16 and circuitry such as a graphics output control device 17 which may include a frame buffer to which data may be written that is to be transferred to an output device such as a monitor 18 for display.
  • a graphics output control device 17 which may include a frame buffer to which data may be written that is to be transferred to an output device such as a monitor 18 for display.
  • Various other well known input/output devices may be joined to the bus 12 in a manner well known to those skilled in the art.
  • such input/output devices are typically connected to the bus through standard arrangements in which a circuit board containing the component circuitry of the peripheral device is plugged into a slot connector provided for connecting to the bus 12.
  • the present invention in one embodiment may be a part of such a component circuit which may be plugged into the bus in order to obtain its benefits.
  • an input/output device 14 may include authenticator circuitry utilized in the present invention.
  • a graphics output control device 17 for controlling the operation of a frame buffer may include circuitry utilized in the present invention.
  • the present invention may be implemented in circuitry connected to the bus 12 in some other manner than through plug-in connectors.
  • FIG. 2 illustrates in detail block diagrams of circuitry utilized in practicing the present invention.
  • the circuitry includes long term storage devices 22 and 24 such as EPROM devices in which are stored binary numbers.
  • One of these numbers is a plaintext number which is stored in device 22 and in a preferred embodiment is 48 bits in length. This value is a random number which is unique to the peripheral component (e.g., the graphic controller 17) or other circuit component and thus uniquely identifies the computer in which the component is placed.
  • a second binary number which is stored in device 24 and is 56 bits in length in one embodiment is a random number which functions as a key value that is utilized to encode the plaintext value. Neither of these numbers may be read by the central processing unit 11 of the system 10.
  • the circuitry also includes an encoding circuit 26 which provides a hardware encoding program which may be initiated by a software purchasing program run on the central processing unit 11.
  • the software program is referred to as a purchasing program because it is especially useful when used in conjunction with an arrangement by which a buyer may purchase the software utilizing electronic downloading, free distribution, or some similar method of obtaining the program.
  • a user who has obtained the application program in some manner may pay for it by running the software purchasing program which is a part of the application program. This initiates the hardware encryption process of the encoding program and produces the output value.
  • the hardware encoding program When the purchasing program is run, the hardware encoding program first concatenates the plaintext value in storage device 22 with a string of zeroes (sixteen in the preferred embodiment) and then encodes the concatenated 64-bit result using the key value from device 24 in a preselected cryptographic algorithm to produce an output value. This output value then represents a unique value for this particular machine.
  • the user transfers the output value to the vendor of the application program (such as the software producer) who responds with a code value representing the application. This transfer by the user may be accompanied by some form of payment such as a credit card number.
  • This code value or password for the application program is obtained from a database used by the vendor.
  • the database includes a password for each output value which may be generated by any computer which includes a peripheral component having circuitry designed in accordance with the present invention.
  • Each password for a particular machine is generated originally by concatenating a non-zero random value (referred to as an application identifier) assigned to the application program equal in length to the string of zeroes used by the particular machine (sixteen bits in the preferred embodiment) with the same unique plaintext value stored in the particular machine, and then encoding the result using the same encoding algorithm and the same unique key value as are stored in the particular machine.
  • This produces a sixty-four bit code value or password which is unique to the machine for that application program.
  • the password (code value) and the output value are produced identically except that the output value is generated using a string of zeroes while the password is generated using an application identifier unique to the application program.
  • This application password from the database of the vendor is transferred back to the buyer.
  • the buyer furnishes the password to the application program, and the password value is stored in an application password file with the original output value for the computer and the application identifier.
  • the application writes its stored password and its sixteen bit application identifier to the input/output device containing the encryption hardware.
  • an authorization program uses the original output value and the application identifier to retrieve the stored password from the password file.
  • This password is sent to a comparator circuit 30 while the application identifier is sent to the encoding circuit 26.
  • the authorization program starts the hardware encoding program which is run by the encoding circuit 26 and runs that program in an authorization mode.
  • the encoding circuit 26 concatenates the application identifier (e.g., the same sixteen bits originally used to generate the passwords for the vendor) and the (secret) plaintext value in the EEPROM storage device 22 and encodes the concatenated result with the (secret) key value in the EEPROM storage device 24 to produce a verification value which should be identical to the password furnished by the vendor.
  • the verification value is sent to the comparison circuit 30 and compared to the password. If the values are the same, the program may be run normally. If they differ, some error result entails. For example, the operation of the computer may be slowed, the quality of the presentation may be degraded, the computer may be stopped, or some other result may occur which makes running the application frustrating or otherwise uninviting.
  • one embodiment of the present invention stores a cyclical redundancy check (CRC) value or a checksum value generated using the plaintext and the key values held in the storage 22 and 24.
  • CRC cyclical redundancy check
  • a checksum may add the bytes of all of the values as though they were binary numbers to arrive at a sum which is then put into twos complement form. The correctness of the values is determined by again adding the bytes of all of the values and the checksum; this should produce zero.
  • a CRC value is computed using a somewhat more complicated algorithm to produce a larger number (typically, one to four bytes). The correctness of the original values is tested by generating the CRC value again and comparing it with the stored CRC value.
  • the plaintext and the key values are read at reset (power up) and verified by testing with the CRC or checksum value. If the result is that the values do not test correctly with the CRC or checksum value, then an error is generated which may cause a result similar to the error generated by failure of the password to test correctly so that the machine functions incorrectly.
  • the authenticating hardware is placed at an address on a component chip which address is shared by other functions on the chip and a match of passwords is required in order to run the application program properly, the ability of the user to remove the code from the operation requiring a password is made more difficult.
  • a preferred encoding algorithm is the data encryption standard (DES) algorithm approved by the government and published for a number of years.
  • DES data encryption standard
  • a detailed explanation of the DES algorithm is provided, for example, at pages 219-241, Applied Cryptography, B. Schneier, published 1994 by John Wiley as Sons, Inc.
  • Other encrypting algorithms might also be utilized to provide secure encoding of the machine value and comparison of the password with the passwords available for that machine.
  • these values may each be translated from binary to digital values which may be transmitted by telephone push buttons or other electronic means.
  • These values may also have a cyclical redundancy check (CRC) value added in a manner well known to those skilled in the art in order that the correctness of the values transmitted to and from the vendor may be checked.
  • CRC cyclical redundancy check
  • This allows a simple telephone arrangement to be provided by which a code value may be received, translated into a password, and the password sent back to the buyer.
  • Other means of use will occur to those skilled in the art.
  • a software vendor has only the output values and passwords for one application identifier.
  • the software vendor does not have the plaintext and the keys. Consequently, the vendor cannot generate passwords for applications from other vendors.

Abstract

A hardware encoding circuit which generates a code value unique to a particular computer, stores a password unique to an application program and to the particular computer, tests the stored password against a verification value generated by the hardware encoding program each time the application program is run, and generates an error signal if the stored password and the verification value do not match.

Description

BACKGROUND OF THE INVENTION
1. Field Of The Invention
This invention relates to computer circuitry and, more particularly, to apparatus and a method for assuring that an application program which is run on a computer is authorized to run on such circuitry.
2. History Of The Prior Art
If an application program is to be executed by a computer, it must be read into the computer's memory from whatever medium (e.g., floppy disk or CD-ROM) was used to supply it to the user. If the application is read into memory it can normally be written to some other storage medium. Since application programs are copyable, anyone who has purchased an application program may copy that program for use by someone else. Because of this, the manufacture and sale of software for personal computers are especially subject to fraud.
There have been various attempts to stop copying in the personal computer industry by varying the format by which an application is placed on the media so that the data cannot be copied using standard utility programs. However, application programs on magnetic media may be easily destroyed or damaged; and buyers are generally unwilling to spend significant sums for any application program which they cannot back up so these attempts have been commercially unsuccessful.
To stop illegal use of software used on workstations, manufacturers have assigned unique numbers to each workstation and prepared a password for each physical piece of software authorized to be used on a particular workstation. When an authorized program is run on a workstation, the value of the password is tested against the workstation number by a software process within the application program, and if the values check; the machine operates. When the values do not check, something undesirable from the standpoint of the operator occurs. This method of monitoring against unauthorized use has cut down the illegal use of software on workstations. However, it is not too difficult to modify the software of the application program so that it will run on a workstation even though the workstation is numbered incorrectly for the particular password. Typically, portions of the copied program which would invoke the check of password against machine number are simply removed from the program.
Unfortunately, personal computers are not equipped with unique identification numbers; and there is presently no useful system in effect for curtailing the use of copied software. Moreover, even were the workstation system of checking to be utilized, it is sufficiently easy to work around that it would only slow the fraudulent use of software for a period until the methods for defeating the safeguard had been passed around to the various computer bulletin boards.
It is very desirable to provide apparatus and a method of reducing the risk that personal computer software which may be copied may then be used without authorization of the manufacturer.
SUMMARY OF THE INVENTION
It is, therefore, an object of the present invention to provide apparatus and a method by which the use of unauthorized software may be precluded on a personal computer.
This and other objects of the present invention are realized by a hardware encoding circuit which generates a code value unique to a particular computer, stores a password unique to an application program and to the particular computer, tests the stored password against a verification value generated by the hardware encoding program each time the application program is run, and generates an error signal if the stored password and the verification value do not match.
These and other objects and features of the invention will be better understood by reference to the detailed description which follows taken together with the drawings in which like elements are referred to by like designations throughout the several views.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram of a computer system which may include the present invention.
FIG. 2 is block diagram illustrating in detail the system of FIG. 1 used in implementing the present invention.
NOTATION AND NOMENCLATURE
Some portions of the detailed descriptions which follow are presented in terms of symbolic representations of operations on data bits within a computer memory. These descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. The operations are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like. It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities.
Further, the manipulations performed are often referred to in terms, such as adding or comparing, which are commonly associated with mental operations performed by a human operator. No such capability of a human operator is necessary or desirable in most cases in any of the operations described herein which form part of the present invention; the operations are machine operations. Useful machines for performing the operations of the present invention include general purpose digital computers or other similar devices. In all cases the distinction between the method operations in operating a computer and the method of computation itself should be borne in mind. The present invention relates to a method and apparatus for operating a computer in processing electrical or other (e.g. mechanical, chemical) physical signals to generate other desired physical signals.
DETAILED DESCRIPTION
Referring now to FIG. 1, there is illustrated a block diagram of a computer system 10 configured to utilize the present invention. The system 10 includes a central processing unit 11 which executes the various instructions provided to control the operations of the system 10. The central processing unit 11 is joined to a bus 12 adapted to carry information between the various components of the system 10. Joined to the bus 12 is main memory 13 which is typically constructed of dynamic random access memory arranged in a manner well known to those skilled in the prior art to store information during a period in which power is provided to the system 10.
Also connected to the bus 12 are various peripheral components such as long term memory 16 and circuitry such as a graphics output control device 17 which may include a frame buffer to which data may be written that is to be transferred to an output device such as a monitor 18 for display.
Various other well known input/output devices may be joined to the bus 12 in a manner well known to those skilled in the art. As is known, such input/output devices are typically connected to the bus through standard arrangements in which a circuit board containing the component circuitry of the peripheral device is plugged into a slot connector provided for connecting to the bus 12. The present invention, in one embodiment may be a part of such a component circuit which may be plugged into the bus in order to obtain its benefits. For example, an input/output device 14 may include authenticator circuitry utilized in the present invention. Alternatively, a graphics output control device 17 for controlling the operation of a frame buffer may include circuitry utilized in the present invention. Alternatively, the present invention may be implemented in circuitry connected to the bus 12 in some other manner than through plug-in connectors.
FIG. 2 illustrates in detail block diagrams of circuitry utilized in practicing the present invention. The circuitry includes long term storage devices 22 and 24 such as EPROM devices in which are stored binary numbers. One of these numbers is a plaintext number which is stored in device 22 and in a preferred embodiment is 48 bits in length. This value is a random number which is unique to the peripheral component (e.g., the graphic controller 17) or other circuit component and thus uniquely identifies the computer in which the component is placed. A second binary number which is stored in device 24 and is 56 bits in length in one embodiment is a random number which functions as a key value that is utilized to encode the plaintext value. Neither of these numbers may be read by the central processing unit 11 of the system 10.
However, the circuitry also includes an encoding circuit 26 which provides a hardware encoding program which may be initiated by a software purchasing program run on the central processing unit 11. The software program is referred to as a purchasing program because it is especially useful when used in conjunction with an arrangement by which a buyer may purchase the software utilizing electronic downloading, free distribution, or some similar method of obtaining the program. A user who has obtained the application program in some manner may pay for it by running the software purchasing program which is a part of the application program. This initiates the hardware encryption process of the encoding program and produces the output value.
When the purchasing program is run, the hardware encoding program first concatenates the plaintext value in storage device 22 with a string of zeroes (sixteen in the preferred embodiment) and then encodes the concatenated 64-bit result using the key value from device 24 in a preselected cryptographic algorithm to produce an output value. This output value then represents a unique value for this particular machine. The user transfers the output value to the vendor of the application program (such as the software producer) who responds with a code value representing the application. This transfer by the user may be accompanied by some form of payment such as a credit card number. This code value or password for the application program is obtained from a database used by the vendor. The database includes a password for each output value which may be generated by any computer which includes a peripheral component having circuitry designed in accordance with the present invention. Each password for a particular machine is generated originally by concatenating a non-zero random value (referred to as an application identifier) assigned to the application program equal in length to the string of zeroes used by the particular machine (sixteen bits in the preferred embodiment) with the same unique plaintext value stored in the particular machine, and then encoding the result using the same encoding algorithm and the same unique key value as are stored in the particular machine. This produces a sixty-four bit code value or password which is unique to the machine for that application program. It will be noted that the password (code value) and the output value are produced identically except that the output value is generated using a string of zeroes while the password is generated using an application identifier unique to the application program.
This application password from the database of the vendor is transferred back to the buyer. The buyer furnishes the password to the application program, and the password value is stored in an application password file with the original output value for the computer and the application identifier. At intervals during each time the application is run, the application writes its stored password and its sixteen bit application identifier to the input/output device containing the encryption hardware. To do this, an authorization program uses the original output value and the application identifier to retrieve the stored password from the password file. This password is sent to a comparator circuit 30 while the application identifier is sent to the encoding circuit 26. The authorization program starts the hardware encoding program which is run by the encoding circuit 26 and runs that program in an authorization mode. The encoding circuit 26 concatenates the application identifier (e.g., the same sixteen bits originally used to generate the passwords for the vendor) and the (secret) plaintext value in the EEPROM storage device 22 and encodes the concatenated result with the (secret) key value in the EEPROM storage device 24 to produce a verification value which should be identical to the password furnished by the vendor. The verification value is sent to the comparison circuit 30 and compared to the password. If the values are the same, the program may be run normally. If they differ, some error result entails. For example, the operation of the computer may be slowed, the quality of the presentation may be degraded, the computer may be stopped, or some other result may occur which makes running the application frustrating or otherwise uninviting.
As an additional feature, one embodiment of the present invention stores a cyclical redundancy check (CRC) value or a checksum value generated using the plaintext and the key values held in the storage 22 and 24. For example, a checksum may add the bytes of all of the values as though they were binary numbers to arrive at a sum which is then put into twos complement form. The correctness of the values is determined by again adding the bytes of all of the values and the checksum; this should produce zero. A CRC value is computed using a somewhat more complicated algorithm to produce a larger number (typically, one to four bytes). The correctness of the original values is tested by generating the CRC value again and comparing it with the stored CRC value. In the present invention, the plaintext and the key values are read at reset (power up) and verified by testing with the CRC or checksum value. If the result is that the values do not test correctly with the CRC or checksum value, then an error is generated which may cause a result similar to the error generated by failure of the password to test correctly so that the machine functions incorrectly.
It will be noted that in order to provide the security necessary to assure that a copy of the program may not be used without authorization, the plaintext and key values stored in the machine cannot be read by the central processing unit except through the hardware program. Moreover, the value which is tested against the password furnished by the vendor is reconstructed whenever the application program and its authorization program are run. By requiring the reconstruction of the value against which the password is tested, no values are available in software from which a comparison may be made for generating a password by a person not authorized to run the software. Moreover, if the authenticating hardware is placed at an address on a component chip which address is shared by other functions on the chip and a match of passwords is required in order to run the application program properly, the ability of the user to remove the code from the operation requiring a password is made more difficult.
A preferred encoding algorithm is the data encryption standard (DES) algorithm approved by the government and published for a number of years. A detailed explanation of the DES algorithm is provided, for example, at pages 219-241, Applied Cryptography, B. Schneier, published 1994 by John Wiley as Sons, Inc. Other encrypting algorithms might also be utilized to provide secure encoding of the machine value and comparison of the password with the passwords available for that machine.
Various methods of transferring the output value and the password between the buyer and the vendor for the sake of convenience. For example, these values may each be translated from binary to digital values which may be transmitted by telephone push buttons or other electronic means. These values may also have a cyclical redundancy check (CRC) value added in a manner well known to those skilled in the art in order that the correctness of the values transmitted to and from the vendor may be checked. This allows a simple telephone arrangement to be provided by which a code value may be received, translated into a password, and the password sent back to the buyer. Other means of use will occur to those skilled in the art. As described above, it is convenient to utilize some form of electronic or telephonic transfer of some form of payment; and this payment may also accomplished at the same time as the output value is transferred.
Moreover, a software vendor has only the output values and passwords for one application identifier. The software vendor does not have the plaintext and the keys. Consequently, the vendor cannot generate passwords for applications from other vendors.
Although the present invention has been described in terms of a preferred embodiment, it will be appreciated that various modifications and alterations might be made by those skilled in the art without departing from the spirit and scope of the invention. The invention should therefore be measured in terms of the claims which follow.

Claims (9)

What is claimed is:
1. A system for assuring that software is utilized only on computers for which it has been specifically authorized comprising
a circuit within a computer for providing a code value which is unique to the computer, the circuit being a part of the computer and a separate circuit from any central processor and being joined to receive signals on an input/output bus,
means deriving a password from a database of code values and passwords which enable the use of an application program on a computer,
means storing a password from the database in the computer,
means for generating a verification value whenever the application program is run, and
means for testing the password stored in the computer and the verification value, and
means for degrading the operation of the computer if the password and the verification value do not match.
2. A system for assuring that software is utilized only on computers for which it has been specifically authorized as claimed in claim 1 in which the means generating a verification value whenever the application program is run comprises:
a hardware circuit for encrypting a first value and a second value using a third value whenever the application program is run.
3. A system for assuring that software is utilized only on computers for which it has been specifically authorized as claimed in claim 2 further comprising
a circuit for verifying the accuracy of the first and third values, and
means for degrading the operation of the computer if the first and the third values do not verify.
4. A system for assuring that software is utilized only on computers for which it has been specifically authorized as claimed in claim 2 in which the hardware circuit includes means running an encryption algorithm, storage for a first value which is a random number, storage for a third value which is a random number, and software means for providing a second value which is unique to the application program.
5. A system for assuring that software is utilized only on computers for which it has been specifically authorized as claimed in claim 1 in which the circuit within a computer for providing a code value which is unique to the computer includes a hardware circuit running an encryption algorithm, storage for a first value which is a random number, storage for a third value which is a random number, and means for providing a second value.
6. A system for assuring that software is utilized only on computers for which it has been specifically authorized as claimed in claim 1
in which the circuit within a computer for providing a code value which is unique to the computer includes
a hardware circuit running an encryption algorithm,
storage for a first value which is a random number,
storage for a third value which is a random number, and
means for providing a second value; and
in which the means generating a verification value whenever the application program is run comprises:
the hardware circuit running an encryption algorithm,
the storage for a first value which is a random number,
the storage for a third value which is a random number, and
software means for providing a second value which is unique to the application program.
7. A circuit for assuring that software is utilized only on computers for which it has been specifically authorized comprising:
a first means furnishing a plaintext value unique to the circuit, means for furnishing an initial value,
a hardware encoding circuit responding to signals furnished in executing programs on the computer for executing an encoding algorithm to generate from the plain text value and the initial value a code value unique to a particular computer,
means for storing a password generated using the encoding algorithm from the plaintext value and a value which is unique to an application program and to the particular computer,
means for selectively providing:
a fixed value as the initial value to the hardware encoding circuit in response to execution by the computer of a first process, and
a value generated utilizing the password in response to execution by the computer of a second process,
a comparator for testing the stored password against code value generated by the hardware encoding circuit in response to running the second process each time the application program is run and for generating an error signal if the stored password and the newly generated code value do not match, and
means for impairing the operation of the particular computer in response to the error signal.
8. A circuit as claimed in claim 7 in which the hardware encoding circuit and comparator share an address with other component circuitry on a computer input/output bus.
9. A method for assuring that software is utilized only on computers for which it has been specifically authorized comprising:
storing a plaintext value and a key value in firmware in a computer,
encrypting by means of a hardware encoding circuit of a computer the plaintext value with a constant value utilizing the key value to generate a code value unique to a particular computer,
storing a password obtained by encrypting the plaintext value with a value unique to an application program utilizing the key value,
testing the stored password against a verification value generated by the hardware encoding circuit by encrypting the plaintext value with a value unique to an application program utilizing the key value when the application program is run,
generating an error signal if the stored password and the newly generated verification value do not match, and
impairing the operation of the particular computer in response to the error signal.
US08/436,143 1995-05-08 1995-05-08 Method and apparatus for authenticating the use of software Expired - Lifetime US5652793A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US08/436,143 US5652793A (en) 1995-05-08 1995-05-08 Method and apparatus for authenticating the use of software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US08/436,143 US5652793A (en) 1995-05-08 1995-05-08 Method and apparatus for authenticating the use of software

Publications (1)

Publication Number Publication Date
US5652793A true US5652793A (en) 1997-07-29

Family

ID=23731284

Family Applications (1)

Application Number Title Priority Date Filing Date
US08/436,143 Expired - Lifetime US5652793A (en) 1995-05-08 1995-05-08 Method and apparatus for authenticating the use of software

Country Status (1)

Country Link
US (1) US5652793A (en)

Cited By (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997050062A1 (en) * 1996-06-24 1997-12-31 Motorola Inc. Method for controlling use of a process
US5870467A (en) * 1994-09-16 1999-02-09 Kabushiki Kaisha Toshiba Method and apparatus for data input/output management suitable for protection of electronic writing data
WO1999013614A1 (en) * 1997-09-05 1999-03-18 Intel Corporation Tamper resistant methods and apparatus
US5892828A (en) * 1996-10-23 1999-04-06 Novell, Inc. User presence verification with single password across applications
US5978920A (en) * 1996-09-04 1999-11-02 Samsung Electronics Co., Ltd. Computer system having a function for intercepting lewd/violent programs and method for controlling access of such lewd/violent programs
WO1999063705A1 (en) * 1998-06-04 1999-12-09 Colvin David S Method and apparatus for securing software to reduce unauthorized use
US6005935A (en) * 1996-11-20 1999-12-21 At&T Corp. Method and system of using personal information as a key when distributing information
US6008737A (en) * 1995-05-30 1999-12-28 Motorola, Inc. Apparatus for controlling utilization of software added to a portable communication device
US6134659A (en) * 1998-01-07 2000-10-17 Sprong; Katherine A. Controlled usage software
US6134593A (en) * 1997-09-30 2000-10-17 Cccomplete, Inc. Automated method for electronic software distribution
US6175925B1 (en) 1996-06-13 2001-01-16 Intel Corporation Tamper resistant player for scrambled contents
US6195766B1 (en) * 1999-05-10 2001-02-27 Conexant Systems, Inc. System and method for providing soft audio and soft modem copy protection for hardware interfaces and software code
US6205550B1 (en) 1996-06-13 2001-03-20 Intel Corporation Tamper resistant methods and apparatus
EP1084549A1 (en) * 1998-06-05 2001-03-21 Intel Corporation Method of controlling usage of software components
US6292692B1 (en) 1999-04-30 2001-09-18 Medical Research Laboratories, Inc. Medical treatment device with functions, operated under passcode control
US20010034840A1 (en) * 1998-06-17 2001-10-25 Jerome Sion System for protecting software
WO2002003176A2 (en) * 2000-06-30 2002-01-10 The Virtual Orchestra Company Limited Apparatus and method for licensing digital data
US6343280B2 (en) 1998-12-15 2002-01-29 Jonathan Clark Distributed execution software license server
US6449645B1 (en) * 1999-01-19 2002-09-10 Kenneth L. Nash System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection
US20030018895A1 (en) * 2001-02-02 2003-01-23 Morrison Gregg B. Processes and systems for enabling secure and controlled distribution and use of information
US20030110375A1 (en) * 1998-06-04 2003-06-12 Z4 Technologies, Inc. Method for monitoring software using encryption including digital signatures/certificates
US20040025036A1 (en) * 2002-07-30 2004-02-05 Eric Balard Run-time firmware authentication
US20040088588A1 (en) * 2002-10-31 2004-05-06 International Business Machines Corporation Limited resource access while power-on-password is active
US20040107368A1 (en) * 1998-06-04 2004-06-03 Z4 Technologies, Inc. Method for digital rights management including self activating/self authentication software
US20040117664A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Apparatus for establishing a connectivity platform for digital rights management
US20040117631A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Method for digital rights management including user/publisher connectivity interface
US20040117628A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Computer readable storage medium for enhancing license compliance of software/digital content including self-activating/self-authenticating software/digital content
US20040117644A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Method for reducing unauthorized use of software/digital content including self-activating/self-authenticating software/digital content
US20040117663A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Method for authentication of digital content used or accessed with secondary devices to reduce unauthorized use or distribution
US6799277B2 (en) 1998-06-04 2004-09-28 Z4 Technologies, Inc. System and method for monitoring software
US20040225894A1 (en) * 1998-06-04 2004-11-11 Z4 Technologies, Inc. Hardware based method for digital rights management including self activating/self authentication software
US6847948B1 (en) * 1999-12-20 2005-01-25 International Business Machines Corporation Method and apparatus for secure distribution of software/data
US20050277465A1 (en) * 2002-04-04 2005-12-15 Microsoft Corporation Method and apparatus for restoring a device to a default state
US20060048236A1 (en) * 2004-09-01 2006-03-02 Microsoft Corporation Licensing the use of software to a particular user
US20060047933A1 (en) * 2004-08-27 2006-03-02 Microsoft Corporation System and method for using address bits to form an index into secure memory
US20060047958A1 (en) * 2004-08-25 2006-03-02 Microsoft Corporation System and method for secure execution of program code
US20060047972A1 (en) * 2004-08-27 2006-03-02 Microsoft Corporation System and method for applying security to memory reads and writes
US20060048132A1 (en) * 2004-09-01 2006-03-02 Microsoft Corporation Licensing the use of a particular feature of software
US20060047959A1 (en) * 2004-08-25 2006-03-02 Microsoft Corporation System and method for secure computing
US20060048221A1 (en) * 2004-08-27 2006-03-02 Microsoft Corporation System and method for using address bits to signal security attributes of data in the address space
US20060047936A1 (en) * 2004-08-27 2006-03-02 Microsoft Corporation System and method for using address lines to control memory usage
US20060059553A1 (en) * 2004-08-27 2006-03-16 Microsoft Corporation System and method for using address bits to affect encryption
US20060064761A1 (en) * 2004-09-22 2006-03-23 Microsoft Corporation Issuing unlock codes from a server with third party billing
US7024554B1 (en) * 2000-09-29 2006-04-04 Mindspeed Technologies, Inc. Systems and methods that authorize target devices utilizing proprietary software and/or hardware
US20060191016A1 (en) * 2005-02-22 2006-08-24 Microsoft Corporation Systems and methods for free demonstration of online premium content prior to purchase
US7331725B2 (en) * 2002-02-28 2008-02-19 Portauthority Technologies Inc. System and method for monitoring unauthorized dissemination of documents and portable media
US20090201126A1 (en) * 2008-02-11 2009-08-13 Sanyo Electric Co., Ltd. Electronic device provided with theft prevention function, and method for preventing theft of electronic devices
US7980471B2 (en) 2003-11-13 2011-07-19 Metrologic Instruments, Inc. Method of unlocking restricted extended classes of features and functionalities embodied within a digital image capture and processing system by reading feature/functionality-unlocking type code symbols
US20130145176A1 (en) * 2005-07-29 2013-06-06 Stmicroelectronics R&D Limited Circuit personalization
US20140006803A1 (en) * 2011-03-21 2014-01-02 Irdeto B.V. System And Method For Securely Binding And Node-Locking Program Execution To A Trusted Signature Authority
US20160350001A1 (en) * 2013-01-16 2016-12-01 Google Inc. Consistent, disk-backed arrays
US10284546B2 (en) * 2015-06-03 2019-05-07 Siemens Aktiengesellschaft Client device and server device for the secured activation of functions of a client
US20190230057A1 (en) * 2015-06-01 2019-07-25 Etas Embedded Systems Canada Inc. System and Method for Resetting Passwords on Electronic Devices

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4599489A (en) * 1984-02-22 1986-07-08 Gordian Systems, Inc. Solid state key for controlling access to computer software
US4609777A (en) * 1984-02-22 1986-09-02 Gordian Systems, Inc. Solid state key for controlling access to computer software
US5012514A (en) * 1990-06-26 1991-04-30 Paul Renton Hard drive security system
US5058162A (en) * 1990-08-09 1991-10-15 Hewlett-Packard Company Method of distributing computer data files
US5282247A (en) * 1992-11-12 1994-01-25 Maxtor Corporation Apparatus and method for providing data security in a computer system having removable memory
US5375243A (en) * 1991-10-07 1994-12-20 Compaq Computer Corporation Hard disk password security system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4599489A (en) * 1984-02-22 1986-07-08 Gordian Systems, Inc. Solid state key for controlling access to computer software
US4609777A (en) * 1984-02-22 1986-09-02 Gordian Systems, Inc. Solid state key for controlling access to computer software
US5012514A (en) * 1990-06-26 1991-04-30 Paul Renton Hard drive security system
US5058162A (en) * 1990-08-09 1991-10-15 Hewlett-Packard Company Method of distributing computer data files
US5375243A (en) * 1991-10-07 1994-12-20 Compaq Computer Corporation Hard disk password security system
US5282247A (en) * 1992-11-12 1994-01-25 Maxtor Corporation Apparatus and method for providing data security in a computer system having removable memory

Cited By (94)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5870467A (en) * 1994-09-16 1999-02-09 Kabushiki Kaisha Toshiba Method and apparatus for data input/output management suitable for protection of electronic writing data
US6008737A (en) * 1995-05-30 1999-12-28 Motorola, Inc. Apparatus for controlling utilization of software added to a portable communication device
US6178509B1 (en) 1996-06-13 2001-01-23 Intel Corporation Tamper resistant methods and apparatus
US6205550B1 (en) 1996-06-13 2001-03-20 Intel Corporation Tamper resistant methods and apparatus
US6175925B1 (en) 1996-06-13 2001-01-16 Intel Corporation Tamper resistant player for scrambled contents
WO1997050062A1 (en) * 1996-06-24 1997-12-31 Motorola Inc. Method for controlling use of a process
US5978920A (en) * 1996-09-04 1999-11-02 Samsung Electronics Co., Ltd. Computer system having a function for intercepting lewd/violent programs and method for controlling access of such lewd/violent programs
US5892828A (en) * 1996-10-23 1999-04-06 Novell, Inc. User presence verification with single password across applications
US6005935A (en) * 1996-11-20 1999-12-21 At&T Corp. Method and system of using personal information as a key when distributing information
WO1999013614A1 (en) * 1997-09-05 1999-03-18 Intel Corporation Tamper resistant methods and apparatus
US6134593A (en) * 1997-09-30 2000-10-17 Cccomplete, Inc. Automated method for electronic software distribution
US6134659A (en) * 1998-01-07 2000-10-17 Sprong; Katherine A. Controlled usage software
US6857078B2 (en) 1998-06-04 2005-02-15 Z4 Technologies, Inc. Method for securing software to increase license compliance
US6502195B1 (en) 1998-06-04 2002-12-31 Z4 Technologies, Inc. Computer readable storage medium for providing repeated contact with software end-user
US6044471A (en) * 1998-06-04 2000-03-28 Z4 Technologies, Inc. Method and apparatus for securing software to reduce unauthorized use
US20040117663A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Method for authentication of digital content used or accessed with secondary devices to reduce unauthorized use or distribution
US6813718B2 (en) 1998-06-04 2004-11-02 Z4 Technologies, Inc. Computer readable storage medium for securing software to reduce unauthorized use
US6813717B2 (en) 1998-06-04 2004-11-02 Z4 Technologies, Inc. Method for securing software to reduce unauthorized use
US6799277B2 (en) 1998-06-04 2004-09-28 Z4 Technologies, Inc. System and method for monitoring software
US6795925B2 (en) 1998-06-04 2004-09-21 Z4 Technologies, Inc. Computer readable storage medium for providing repeated contact with software end-user
US6446211B1 (en) 1998-06-04 2002-09-03 Z4 Technologies, Inc. Method and apparatus for monitoring software using encryption
US6792548B2 (en) 1998-06-04 2004-09-14 Z4 Technologies, Inc. Method for providing repeated contact with software end-user using authorized administrator
US6460142B1 (en) 1998-06-04 2002-10-01 24 Technologies, Inc. Method and apparatus for repeated contact software end-user
US20040117644A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Method for reducing unauthorized use of software/digital content including self-activating/self-authenticating software/digital content
US6484264B1 (en) 1998-06-04 2002-11-19 Z4 Technologies, Inc. Method for providing repeated contact with software end-user using authorized administrator
US20040225894A1 (en) * 1998-06-04 2004-11-11 Z4 Technologies, Inc. Hardware based method for digital rights management including self activating/self authentication software
US6792549B2 (en) 1998-06-04 2004-09-14 Z4 Technologies, Inc. Method and apparatus for repeated contact of software end-user
US6986063B2 (en) 1998-06-04 2006-01-10 Z4 Technologies, Inc. Method for monitoring software using encryption including digital signatures/certificates
US20030110375A1 (en) * 1998-06-04 2003-06-12 Z4 Technologies, Inc. Method for monitoring software using encryption including digital signatures/certificates
WO1999063705A1 (en) * 1998-06-04 1999-12-09 Colvin David S Method and apparatus for securing software to reduce unauthorized use
US6785825B2 (en) 1998-06-04 2004-08-31 Z4 Technologies, Inc. Method for securing software to decrease software piracy
US20040107368A1 (en) * 1998-06-04 2004-06-03 Z4 Technologies, Inc. Method for digital rights management including self activating/self authentication software
US20040117664A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Apparatus for establishing a connectivity platform for digital rights management
US20040117631A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Method for digital rights management including user/publisher connectivity interface
US20040117628A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Computer readable storage medium for enhancing license compliance of software/digital content including self-activating/self-authenticating software/digital content
EP1084549A4 (en) * 1998-06-05 2002-11-13 Intel Corp Method of controlling usage of software components
EP1084549A1 (en) * 1998-06-05 2001-03-21 Intel Corporation Method of controlling usage of software components
US6769064B2 (en) * 1998-06-17 2004-07-27 Schlumberger Systemes System for protecting software
US20010034840A1 (en) * 1998-06-17 2001-10-25 Jerome Sion System for protecting software
US6343280B2 (en) 1998-12-15 2002-01-29 Jonathan Clark Distributed execution software license server
US6449645B1 (en) * 1999-01-19 2002-09-10 Kenneth L. Nash System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection
USRE41227E1 (en) * 1999-01-19 2010-04-13 Nash Kenneth L System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection
US6292692B1 (en) 1999-04-30 2001-09-18 Medical Research Laboratories, Inc. Medical treatment device with functions, operated under passcode control
US6195766B1 (en) * 1999-05-10 2001-02-27 Conexant Systems, Inc. System and method for providing soft audio and soft modem copy protection for hardware interfaces and software code
US6847948B1 (en) * 1999-12-20 2005-01-25 International Business Machines Corporation Method and apparatus for secure distribution of software/data
WO2002003176A3 (en) * 2000-06-30 2003-05-30 Virtual Orchestra Company Ltd Apparatus and method for licensing digital data
WO2002003176A2 (en) * 2000-06-30 2002-01-10 The Virtual Orchestra Company Limited Apparatus and method for licensing digital data
US7024554B1 (en) * 2000-09-29 2006-04-04 Mindspeed Technologies, Inc. Systems and methods that authorize target devices utilizing proprietary software and/or hardware
US20030018895A1 (en) * 2001-02-02 2003-01-23 Morrison Gregg B. Processes and systems for enabling secure and controlled distribution and use of information
US20080094654A1 (en) * 2002-02-28 2008-04-24 Portauthority Technologies Inc. System and method for monitoring unauthorized dissemination of documents and portable media
US7331725B2 (en) * 2002-02-28 2008-02-19 Portauthority Technologies Inc. System and method for monitoring unauthorized dissemination of documents and portable media
US7859725B2 (en) 2002-02-28 2010-12-28 Portauthority Technologies Inc. System and method for monitoring unauthorized dissemination of documents and portable media
US20050277464A1 (en) * 2002-04-04 2005-12-15 Microsoft Corporation Method and apparatus for restoring a device to a default state
US20050277465A1 (en) * 2002-04-04 2005-12-15 Microsoft Corporation Method and apparatus for restoring a device to a default state
US7437607B2 (en) * 2002-04-04 2008-10-14 Microsoft Corporation Method and apparatus for restoring a device to a default state
US7441151B2 (en) * 2002-04-04 2008-10-21 Microsoft Corporation Method and apparatus for restoring a device to a default state
US20040025036A1 (en) * 2002-07-30 2004-02-05 Eric Balard Run-time firmware authentication
US7539868B2 (en) * 2002-07-30 2009-05-26 Texas Instruments Incorporated Run-time firmware authentication
US20040088588A1 (en) * 2002-10-31 2004-05-06 International Business Machines Corporation Limited resource access while power-on-password is active
US8317105B2 (en) 2003-11-13 2012-11-27 Metrologic Instruments, Inc. Optical scanning system having an extended programming mode and method of unlocking restricted extended classes of features and functionalities embodied therewithin
US7980471B2 (en) 2003-11-13 2011-07-19 Metrologic Instruments, Inc. Method of unlocking restricted extended classes of features and functionalities embodied within a digital image capture and processing system by reading feature/functionality-unlocking type code symbols
US9104930B2 (en) 2003-11-13 2015-08-11 Metrologic Instruments, Inc. Code symbol reading system
US7802110B2 (en) 2004-08-25 2010-09-21 Microsoft Corporation System and method for secure execution of program code
US20060047959A1 (en) * 2004-08-25 2006-03-02 Microsoft Corporation System and method for secure computing
US20060047958A1 (en) * 2004-08-25 2006-03-02 Microsoft Corporation System and method for secure execution of program code
US20060047933A1 (en) * 2004-08-27 2006-03-02 Microsoft Corporation System and method for using address bits to form an index into secure memory
US20060048221A1 (en) * 2004-08-27 2006-03-02 Microsoft Corporation System and method for using address bits to signal security attributes of data in the address space
US20060047972A1 (en) * 2004-08-27 2006-03-02 Microsoft Corporation System and method for applying security to memory reads and writes
US7356668B2 (en) 2004-08-27 2008-04-08 Microsoft Corporation System and method for using address bits to form an index into secure memory
US7444523B2 (en) 2004-08-27 2008-10-28 Microsoft Corporation System and method for using address bits to signal security attributes of data in the address space
US20060059553A1 (en) * 2004-08-27 2006-03-16 Microsoft Corporation System and method for using address bits to affect encryption
US7822993B2 (en) 2004-08-27 2010-10-26 Microsoft Corporation System and method for using address bits to affect encryption
US20060047936A1 (en) * 2004-08-27 2006-03-02 Microsoft Corporation System and method for using address lines to control memory usage
US7653802B2 (en) 2004-08-27 2010-01-26 Microsoft Corporation System and method for using address lines to control memory usage
US7734926B2 (en) 2004-08-27 2010-06-08 Microsoft Corporation System and method for applying security to memory reads and writes
US20060048236A1 (en) * 2004-09-01 2006-03-02 Microsoft Corporation Licensing the use of software to a particular user
US20060048132A1 (en) * 2004-09-01 2006-03-02 Microsoft Corporation Licensing the use of a particular feature of software
US20060059571A1 (en) * 2004-09-01 2006-03-16 Microsoft Corporation Licensing the use of software on a particular CPU
US7552341B2 (en) 2004-09-01 2009-06-23 Microsoft Corporation Licensing the use of software on a particular CPU
US7849329B2 (en) * 2004-09-01 2010-12-07 Microsoft Corporation Licensing the use of a particular feature of software
US20060064761A1 (en) * 2004-09-22 2006-03-23 Microsoft Corporation Issuing unlock codes from a server with third party billing
US20060191016A1 (en) * 2005-02-22 2006-08-24 Microsoft Corporation Systems and methods for free demonstration of online premium content prior to purchase
US7725929B2 (en) 2005-02-22 2010-05-25 Microsoft Corporation Systems and methods for free demonstration of online premium content prior to purchase
US8838998B2 (en) * 2005-07-29 2014-09-16 Stmicroelectronics (Research & Development) Limited Circuit personalization
US20130145176A1 (en) * 2005-07-29 2013-06-06 Stmicroelectronics R&D Limited Circuit personalization
US20090201126A1 (en) * 2008-02-11 2009-08-13 Sanyo Electric Co., Ltd. Electronic device provided with theft prevention function, and method for preventing theft of electronic devices
US9754115B2 (en) * 2011-03-21 2017-09-05 Irdeto B.V. System and method for securely binding and node-locking program execution to a trusted signature authority
US20140006803A1 (en) * 2011-03-21 2014-01-02 Irdeto B.V. System And Method For Securely Binding And Node-Locking Program Execution To A Trusted Signature Authority
CN103797489A (en) * 2011-03-21 2014-05-14 耶德托公司 System and method for securely binding and node-locking program execution to a trusted signature authority
US20160350001A1 (en) * 2013-01-16 2016-12-01 Google Inc. Consistent, disk-backed arrays
US10067674B2 (en) * 2013-01-16 2018-09-04 Google Llc Consistent, disk-backed arrays
US20190230057A1 (en) * 2015-06-01 2019-07-25 Etas Embedded Systems Canada Inc. System and Method for Resetting Passwords on Electronic Devices
US10637818B2 (en) * 2015-06-01 2020-04-28 Etas Embedded Systems Canada Inc. System and method for resetting passwords on electronic devices
US10284546B2 (en) * 2015-06-03 2019-05-07 Siemens Aktiengesellschaft Client device and server device for the secured activation of functions of a client

Similar Documents

Publication Publication Date Title
US5652793A (en) Method and apparatus for authenticating the use of software
TW413988B (en) Cryptographic system
EP0768601B1 (en) Device for executing enciphered program
US6343280B2 (en) Distributed execution software license server
JP2996331B2 (en) Software distribution system and software distribution method
US5386469A (en) Firmware encryption for microprocessor/microcomputer
US5428685A (en) IC memory card and method of protecting data therein
AU782891B2 (en) Electronic security technique for gaming software
JP3074639B2 (en) Method and apparatus for validating system operation
USRE38375E1 (en) Method and system for the secured distribution of multimedia titles
US6032257A (en) Hardware theft-protection architecture
US6961852B2 (en) System and method for authenticating software using hidden intermediate keys
US6233567B1 (en) Method and apparatus for software licensing electronically distributed programs
TWI395606B (en) Hard drive authentication
US6871192B2 (en) System and method for preventing unauthorized use of protected software utilizing a portable security device
EP0302710A2 (en) A method of controlling the use of computer programs
EP0715242A1 (en) Method and system for digital information protection
JPS61139878A (en) Safety protection module for electronic fund transfer
JPH0260007B2 (en)
JPS61139873A (en) Authorization system
KR870008258A (en) Offline cash card system and method
US11875328B2 (en) System and method for secure detokenization
JPS63236188A (en) Information reading verification
JP2002281019A (en) Portable information storage medium and method for authenticating the same
US6336189B1 (en) Apparatus and method for data capsule generation

Legal Events

Date Code Title Description
AS Assignment

Owner name: NVIDIA CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PRIEM, CURTIS;ROSENTHAL, DAVID S.H.;REEL/FRAME:007480/0581

Effective date: 19950424

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: PAT HLDR NO LONGER CLAIMS SMALL ENT STAT AS SMALL BUSINESS (ORIGINAL EVENT CODE: LSM2); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12